Exam 10: Information Security and Network Protocols
Exam 1: Cybersecurity and Network Protocols23 Questions
Exam 2: DNS, IDS/IPS, and Digital Investigations9 Questions
Exam 3: Investigative Techniques and Digital Evidence in Crime Investigations5 Questions
Exam 4: Information Security and Encryption Terminology23 Questions
Exam 5: Cryptography and Data Protection22 Questions
Exam 6: Cryptography and VPNS23 Questions
Exam 7: Cryptography and Security Measures in Network Communication23 Questions
Exam 8: Cryptography Terminology and Techniques25 Questions
Exam 9: Cryptography and Network Security22 Questions
Exam 10: Information Security and Network Protocols23 Questions
Exam 11: Cryptography and Cryptographic Protocols23 Questions
Exam 12: Security Protocols, VPNS, and Firewalls21 Questions
Exam 13: Understanding Cyber-Crime and Firewall Technologies in IT Act29 Questions
Select questions type
If communication between 2 people is overheard by a third person without extraction of any data, it is called as:
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
D
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?
Free
(Multiple Choice)
5.0/5
(24)
Correct Answer:
C
When you use the word it means you are protecting your data from getting disclosed.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
A
Transport layer Protocol consists of ______________ main components
(Multiple Choice)
4.9/5
(38)
______________means the protection of data from modification by unknown users.
(Multiple Choice)
5.0/5
(30)
This helps in identifying the origin of information and authentic user. This referred to here as ______________
(Multiple Choice)
4.8/5
(38)
If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:
(Multiple Choice)
5.0/5
(38)
An attack in which the user receives unwanted amount of e- mails.
(Multiple Choice)
4.8/5
(33)
Compromising confidential information comes under ______________
(Multiple Choice)
4.8/5
(33)
From the options below, which of them is not a threat to information security?
(Multiple Choice)
4.9/5
(37)
______________of information means, only authorised users are capable of accessing the information.
(Multiple Choice)
4.9/5
(35)
Data integrity gets compromised when and are taken control off.
(Multiple Choice)
4.9/5
(32)
When integrity is lacking in a security system, ______________ occurs.
(Multiple Choice)
4.8/5
(32)
Study of creating a d using encryption and decryption techniques.
(Multiple Choice)
4.8/5
(35)
In layer, vulnerabilities are directly associated with physical access to networks and hardware.
(Multiple Choice)
4.7/5
(38)
______________is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
(Multiple Choice)
4.9/5
(36)
In same keys are implemented for encrypting as well as decrypting the information.
(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 23
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)